The postings on this site solely reflect the personal views of each author and do not necessarily represent the views, positions, strategies or opinions of IBM or IBM management. IBM reserves the right to remove content deemed inappropriate.

Post
by
Vikash
Abraham,
Product
Marketing
Manager
for
IBM
Security
Solutions
What
Zen,
Ancient
Wisdom
and
Infrastructure
Security
Have
in
Common
Ancient
wisdom
continues
to
amaze
me,
and
this
struck
me:
Isn’t
there
a
strong
correlation
between
ancient
philosophies
and
infrastructure
security?
This
blog
post
does
not
look
at
measuring
the
superiority
... [ + Read more ]

This
post
was
contributed
by
Nick
Harlow,
Product
Manager
-
Server
Security
and
Security
Content
Analysis
for
IBM
Security.
Today’s
complex
information
technology
(IT)
environments
consist
of
many
systems,
connected
to
serve
the
needs
of
a
given
organization.
In
order
to
bring
order
and
governance
to
this
complexity,
IT
architects
... [ + Read more ]

Earlier
this
summer
IBM
Security
announced
the
availability
of
our
next
generation
intrusion
prevention
system
(IPS),
that
when
coupled
with
the
global
threat
intelligence
from
our
X-Force
Research
Team
and
the
intelligence
provided
by
our
Advanced
Threat
Protection
Platform
gives
organizations
complete
visibility
into
what
is
going
on
across
their
... [ + Read more ]

This
post
is
contributed
by
Paul
Kaspian,
Senior
Product
Marketing
Manager
for
IBM
Security.
In
network
security
we
spend
a
lot
of
time
looking
at
threats
coming
into
our
organizations
from
the
outside.
This
makes
a
lot
of
sense
considering
the
fact
that
our
networks
are
under
siege
from
increasingly
... [ + Read more ]

Guest
post
by
Brian
Fitch,
Product
Manager
for
IBM
Security.
People
spend
a
lot
of
time
pondering
what
the
future
will
hold.
For
those
of
us
working
in
network
security,
we
daydream
about
a
future
full
of
integrated
security
technologies
that
will
simplify
our
jobs.
But
is
that
just
wishful
... [ + Read more ]

Guest
post
by
Nicholas
G.
Harlow,
product
manager,
IBM
Security.In
traditional
IT
infrastructure,
organizations
controlled
every
aspect
of
the
environment,
from
the
physical
building,
to
the
machine
hardware,
to
the
software
stack,
and
the
data
repositories.
Enforcing
security
in
this
environment
was
easier
because
there
were
fewer
variables
to
control.
... [ + Read more ]